PART A
Write one criterion that will measure the effectiveness of data security for each of the following areas. Use our school as your organisation.
1. Integrity of data
Criteria
Teacher Comment
Check dates for sacs are updated/correct. If not authorised persons should change incorrect and save the correct dates. Do the files open correctly (Microsoft word at home and school) If settings are incorrect or the file cannot be opened on a later version of Microsoft then files should be opened on a computer with Microsoft word 2007 and then be saved as a 97-200 word document, making it compatible with both 2007 and previous versions.
2. Security
Criteria
Teacher Comment
Do you need a username and password to access files?
Is all personal student information kept on a separate hard drive?
3. Ease of retrieval
Criteria
Teacher Comment
Making sure that the files that need to be accessed by teachers are saved in the O:/ drive under the correct folder and making sure that your personal work for each subject is placed in M/; drive under the folder dedicated to that subject.
Students know where to save their work for particular subjects.
The front office knows where information is saved. Eg: the letter that is to be sent home when students don’t hand in SACs.
4. Currency of file
Criteria
Teacher Comment
PART B
Write one criterion that will measure the effectiveness of data security management strategies.
Read pp249-252 of text
PART A
Write one criterion that will measure the effectiveness of data security for each of the following areas. Use our school as your organisation.
1. Integrity of data
If not authorised persons should change incorrect and save the correct dates.
Do the files open correctly (Microsoft word at home and school)
If settings are incorrect or the file cannot be opened on a later version of Microsoft then files should be opened on a computer with Microsoft word 2007 and then be saved as a 97-200 word document, making it compatible with both 2007 and previous versions.
2. Security
3. Ease of retrieval
The front office knows where information is saved. Eg: the letter that is to be sent home when students don’t hand in SACs.
4. Currency of file
Write one criterion that will measure the effectiveness of data security management strategies.